If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.

Oh yeah baby.

One or more ports on this system are operating in FULL STEALTH MODE!

wohoooo

Ports found to be OPEN were: 1025, 5000

Other than what is listed above, all ports are CLOSED. except 135, 139, 445 wich are stealth.

I dont have a firewall installed, i dont have internet secuirt installed, i dont have an Anti Virus. I remove most of them by hand. My computer setting that I did set up seem to be secure even without a firewall.

That's not fair, it seems as if you run a service like a webserver, then you fail no matter what. Maybe mine is just configured wrong. Does anyone else have a service such as ftp or http that can verify that you automatically fail just from running one of these?

Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice.

slick

[edit] same with and without a firewall [/edit]

\"Look, Doc, I spent last Tuesday watching fibers on my carpet. And the whole time I was watching my carpet, I was worrying that I, I might vomit. And the whole time, I was thinking, \"I\'m a grown man. I should know what goes on my head.\" And the more I thought about it... the more I realized that I should just blow my brains out and end it all. But then I thought, well, if I thought more about blowing my brains out... I start worrying about what that was going to do to my goddamn carpet. Okay, so, ah-he, that was a GOOD day, Doc. And, and I just want you to give me some pills and let me get on with my life. \" -Roy Waller

Blue lights all the way, apart from a couple of ports which were stealthed. But then I'm behind a router with a built-in firewall so I'd expect that to be the case.

Btw, I've not changed any settings since I put the router in place, so I'm quite impressed that it didn't have any open ports 'out of the box'. Anyway, using NAT means that you can only hit my router with ping floods etc. - I'm sure it would take a lot of effort to actually hit anything on my private network.

The grc scan showed no services (last time it showed my ports as a seemingly random mix of closed/stealth). The sygate online scan http://scan.sygatetech.com/ showed my ssh (behind a router). Obviously sygate scan has something that grc does not. Besides the fact that sygate offers far more flexibillity. (i am a little biased against the hype filled grc site)

Do unto others as you would have them do unto you.
The international ban against torturing prisoners of war does not necessarily apply to suspects detained in America\'s war on terror, Attorney General John Ashcroft told a Senate oversight committee
-- true colors revealed, a brown shirt and jackboots